All Episodes

Displaying 1 - 20 of 70 in total

Episode 1 — Conquer the GCTI blueprint

Mastering the GIAC Cyber Threat Intelligence (GCTI) certification begins with a comprehensive understanding of the exam blueprint, which serves as the official roadmap...

Episode 2 — Decode scoring, timing, proctoring, and hidden pitfalls

Navigating the administrative and logistical landscape of a high-stakes certification exam is just as critical as technical proficiency for achieving a passing score. ...

Episode 3 — Build a winning audio-only study routine

Developing a highly effective, audio-driven study routine allows busy professionals to maximize their preparation time by integrating learning into their daily commute...

Episode 4 — Grasp threat intelligence essentials with real-world focus

The foundation of a world-class security posture is built upon a deep understanding of threat intelligence essentials, moving beyond theoretical definitions to focus o...

Episode 5 — Separate strategic, operational, and tactical intelligence fast

Effectively categorizing intelligence into strategic, operational, and tactical levels is a core requirement for both the GCTI exam and the successful operation of a t...

Episode 6 — Master the full intelligence cycle without busywork

The intelligence cycle provides the structural backbone for any professional analytical mission, transforming fragmented data into a cohesive and actionable security p...

Episode 7 — Profile threat actors, motives, and constraints that matter

Successful intrusion analysis requires moving beyond technical artifacts to understand the human adversary, their underlying motivations, and the operational constrain...

Episode 8 — Write crisp intelligence requirements stakeholders love

The success of an intelligence program is dictated by its ability to answer the specific questions posed by its stakeholders, making the creation of crisp intelligence...

Episode 9 — Pick high-value sources and skip the noise

In an era of information overload, the ability to identify and prioritize high-value sources while filtering out irrelevant "noise" is essential for analytical efficie...

Episode 10 — Read network telemetry for signals that count

Network telemetry serves as a primary source of ground truth during an investigation, providing a technical record of every interaction between the adversary and the t...

Episode 11 — Turn messy logs into decision-ready insights

Raw system logs are often voluminous and chaotic, requiring a disciplined approach to processing to transform them into insights that a leader can use to make a decisi...

Episode 12 — Pull forensic artifacts that advance your hypothesis

Forensic artifacts left behind on a compromised host provide the most detailed evidence of an adversary's presence and their specific technical actions. This episode f...

Episode 13 — Make external threat feeds actually pay off

External threat feeds are often a major investment for security teams, but they only provide value if they are correctly integrated and operationalized within the loca...

Episode 14 — Mine internal telemetry for durable intelligence wins

While external data is important, your own internal telemetry often provides the most durable and high-fidelity intelligence "wins" for your specific organization. Thi...

Episode 15 — Extract domain intelligence that drives confident pivots

Domain names and their associated infrastructure are often the most visible and easily trackable components of an adversary's offensive operation. This episode focuses...

Episode 16 — Exploit certificate transparency for stealthy infrastructure clues

Certificate Transparency (CT) logs provide a goldmine of information for analysts looking to identify adversary infrastructure before it is even fully operational. Thi...

Episode 17 — Normalize incoming data so patterns pop out

Data normalization is the essential process of converting disparate log formats and technical artifacts into a common schema so that patterns and correlations become v...

Episode 18 — Deduplicate, cleanse, and harden your datasets

A high-fidelity intelligence product depends on the quality of its underlying data, requiring a disciplined approach to deduplication and cleansing to ensure accuracy....

Episode 19 — Govern retention, access, and evidence integrity

Effective intelligence governance requires strict controls over how long data is stored, who can access it, and how the technical integrity of the evidence is maintain...

Episode 20 — Exam Acronyms: quick audio reference you’ll reuse

The field of threat intelligence is saturated with complex acronyms that serve as a shorthand for critical technical concepts, frameworks, and protocols. This episode ...

Broadcast by